Search Results for "" Homeland ""
Not finding what you’re looking for?
10 of 25537 Results
Integrate the Cloud Into a C4I Strategy
When it comes to the transition from command, control, communications, computers and intelligence (C4I) systems to cloud computing architectures, both the challenge—and the promise—boil down to “getting the right information to the right individual at the right time and doing it securely.”
Avionics Keys Successful Growth Strategy
Combining alpine skiing with avionics may not be a standard formula for business success except to Brad Lawrence. The 64-year-old avionics executive is pursuing an aggressive business model that fits with his personal recreational philosophy as he takes his high-technology company forward in an era of tighter defense budgets. Based in the Seattle suburb of Bellevue, Lawrence’s Esterline Technologies Corporation is at the forefront of broad new economic imperatives reshaping defense contractors in this time of shifting Pentagon funding priorities.
Will Web 3.0 Be Realized Anytime Soon in the Global Security Community?
The world may be on the cusp of Web 3.0. Some of us digital immigrants still are trying to get our arms around Web 2.0. We have been told that Web 2.0 is all about information sharing. Applications, storage and data are Web-enabled. Virtualization has made information easier to use and share. Social networking has created whole new environments for information sharing.
Newest Networks Now for the Military
As commercial carriers around the globe begin to offer 4G networks to customers, the U.S. government is looking for similar capabilities in its organizations. A pioneering project is scheduled to move onto the battlefield soon to provide disadvantaged users with 3G capabilities for intelligence dissemination, but even as that moves forward, the next-generation wireless capability will become available.
Military Elite Fly High in Afghanistan
Military use of unmanned systems has increased substantially during the years of war in the Middle East, and even the service branch usually at home on the water is taking to the skies to support ground operations. The U.S. Navy is using ScanEagle platforms to support special operations forces in battle, helping to save lives as well as to complete missions successfully.
Special Operations Has Special Networking Needs
The J-6 and chief information officer of the U.S. Special Operations Command may not be an international man of mystery, but he does have multiple roles that aid sensitive operations. Unlike similar positions at other U.S. combatant commands, the leader in charge of communications for special forces manages his own network and a discretionary budget. The result is a unique situation that enables quick responses to warfighters’ needs.
Harsh Budget Realities Redefine Future Forces
The severity of the global financial crisis has permeated budgeting within the defense sector, and indications are that the cuts will go far deeper than many of the experts believe is practical. As a result, the task at hand is to shape the future in a very different budget environment than ever before, with leaders being challenged to make decisions without the benefit of historical models. The fiscal crisis in the United States is its primary security threat today, according to Gen. Raymond T. Odierno, USA, former commander, U.S. Joint Forces Command.
Gen. Odierno joined other high-ranking military and civilian officials offering nontraditional glimpses of the future at Joint Warfighting 2011, held May 10-12 in Virginia Beach, Virginia.
Operators, Industry Guide Special Forces Acquisition
Special operations forces are looking to the commercial communications marketplace for their next generation of information systems and solutions. However, the U.S. Special Operations Command’s ability to tap commercial off-the-shelf systems is proving more difficult as its needs become more complex.
A Culture Shock Is Coming
The majority of the 2.5 million military, civilian or reserve personnel in the U.S. Defense Department do not care much about the technical details of computing. Users only wish to receive answers reliably and quickly. Requested information needs to be available regardless of the computing device they use. Responses must be secure. No restrictions should hamper access by certified users communicating from remote locations. Information has to be available for people authorized to make use of what they receive.
This 4th of July, Celebrate Our Nation's Heroes
The president and CEO of the USO of Metropolitan Washington encourages everyone to remember our troops and their families as we celebrate our nation's independence.